Connect with us

CyberSecurity

How Anthropic’s Claude AI Uncovered a Hidden Apache ActiveMQ Vulnerability After 13 Years

Published

on

How Anthropic’s Claude AI Uncovered a Hidden Apache ActiveMQ Vulnerability After 13 Years

For more than a decade, a critical security flaw lurked undetected within Apache ActiveMQ Classic, a widely used open-source message broker. The bug, recently identified as CVE-2026-34197, was finally exposed with the help of Anthropic’s AI assistant, Claude. This discovery highlights the growing role of artificial intelligence in cybersecurity and vulnerability research.

The flaw, categorized as a remote code execution (RCE) vulnerability, allows attackers to execute arbitrary operating system commands on affected systems. Horizon3.ai chief architect Naveen Sunkavally detailed the discovery in an April 7 blog post, emphasizing that organizations running ActiveMQ should prioritize patching immediately.

According to Sunkavally, “An attacker can invoke a management operation through ActiveMQ’s Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS commands.” The vulnerability requires credentials, but default credentials (admin:admin) are common in many environments. On versions 6.0.0 through 6.1.1, no credentials are required due to another issue, CVE-2024-32114, which exposes the Jolokia API without authentication. In those versions, CVE-2026-34197 becomes an unauthenticated RCE threat.

Understanding the Apache ActiveMQ Bug and Its Impact

This Apache ActiveMQ bug has remained hidden for 13 years because it involves multiple components developed independently over time. In isolation, each feature appeared safe, but when chained together, they created a dangerous exploit path. Sunkavally noted that this is exactly where Claude excelled—efficiently stitching together the attack path end to end with a clear head free of assumptions.

“Something that would have probably taken me a week manually took Claude 10 minutes,” he said. The AI’s ability to analyze source code and identify complex interactions between components made it an invaluable tool in this discovery.

How the Vulnerability Works

The exploit leverages ActiveMQ’s Jolokia API, a management interface that allows remote access to the broker’s internal operations. By sending a crafted POST request to /api/jolokia/ containing an addNetworkConnector command, an attacker can trick the broker into fetching a malicious remote configuration file. This file then triggers the execution of arbitrary OS commands, granting the attacker control over the system.

Organizations concerned about potential compromise should check ActiveMQ broker logs for network connector activity referencing vm:// URIs with brokerConfig=xbean:http. Additional indicators of compromise include:

  • POST requests to /api/jolokia/ containing addNetworkConnector in the request body
  • Outbound HTTP requests from the ActiveMQ broker process to unexpected hosts
  • Unexpected child processes spawned by the ActiveMQ Java process

Patches and Mitigation Steps for the ActiveMQ RCE Vulnerability

The ActiveMQ RCE vulnerability has been patched in ActiveMQ Classic versions 5.19.4 and 6.2.3. Users are strongly advised to update to these versions immediately. Additionally, ensure that no default credentials are in use. Changing the default admin:admin credentials is a critical step, as many environments still rely on these weak passwords.

For organizations unable to patch immediately, implementing network segmentation and restricting access to the Jolokia API can help reduce risk. Monitoring for the indicators of compromise listed above is also essential for early detection.

If you are using ActiveMQ, review your configuration and apply the latest updates. For more on securing message brokers, check out our guide on best practices for message broker security.

Claude AI: A New Tool for Vulnerability Hunting

Sunkavally described the discovery of CVE-2026-34197 as “80% Claude and 20% gift-wrapping by a human.” He regularly uses Claude to take a first pass at source code for vulnerability hunting, prompting it lightly and setting up a target on the network for it to validate findings.

“A lot of the time, Claude finds interesting stuff but it doesn’t quite rise to the level of a CVE I’d bother reporting. In this case, it did a great job, with nothing more than a couple of basic prompts,” he said.

This case demonstrates how AI can accelerate vulnerability research, especially for bugs that involve complex interactions across multiple components. Sunkavally urged appsec engineers and developers to adopt tools like Claude in their workflows, stating that “anyone with a security background can take advantage.”

As AI continues to evolve, its role in cybersecurity will likely expand. For more insights on AI-driven security research, explore our article on how artificial intelligence is transforming threat detection.

Final Thoughts on the 13-Year-Old Bug

The discovery of this Apache ActiveMQ bug serves as a stark reminder that vulnerabilities can remain hidden for years, especially when they involve multiple independent components. The use of AI tools like Claude can help uncover these hidden threats more efficiently than traditional manual methods.

Organizations running ActiveMQ should act quickly to patch and review their security posture. By combining AI-powered vulnerability hunting with robust security practices, the cybersecurity community can stay ahead of evolving threats. For more on securing open-source software, see our tips for open-source security.

CyberSecurity

France Ditches Windows for Linux: A Bold Move Toward Digital Sovereignty

Published

on

France Ditches Windows for Linux: A Bold Move Toward Digital Sovereignty

In a significant shift, France has announced plans to replace Microsoft Windows with Linux on thousands of government computers. This decision, part of a broader push for digital sovereignty, aims to reduce the country’s dependence on American technology. The move reflects growing unease across Europe about relying on US-based tech giants amid geopolitical instability.

Why France Ditches Windows for Linux Now

The French government’s decision comes as a direct response to concerns over data control and infrastructure security. In a statement, French minister David Amiel emphasized the need to “regain control of our digital destiny.” He argued that France can no longer accept a situation where its data and digital systems are tied to US companies.

This shift is not sudden. It follows a pattern of increasing distrust toward American tech firms, especially after recent actions by the Trump administration. Sanctions and trade disruptions have made European leaders acutely aware of their vulnerabilities.

As a result, France ditches Windows for Linux not just as a technical upgrade, but as a strategic move to bolster national autonomy.

The Linux Migration Plan: What We Know So Far

The transition will begin with computers at the French government’s digital agency, DINUM. While no specific timeline or Linux distribution has been announced, the government is exploring various open source options tailored for enterprise use.

Linux, being free and highly customizable, offers France the flexibility to adapt its operating system to specific government needs. This contrasts sharply with proprietary software like Windows, which ties users to Microsoft’s ecosystem and licensing fees.

Building on this, the French government has also taken other steps to reduce US tech reliance. Earlier this year, it stopped using Microsoft Teams for video conferencing, switching to Visio, a French-developed tool based on the open source platform Jitsi.

Health Data Platform Migration

In addition to the operating system shift, France plans to migrate its health data platform to a new trusted system by the end of the year. This move underscores a broader commitment to securing sensitive citizen data within national borders.

Digital Sovereignty: A European Trend

France is not alone in this endeavor. Across Europe, lawmakers are waking up to the risks of over-reliance on US technology. In January, the European Parliament voted to adopt a report directing the European Commission to identify areas where the EU can reduce its dependence on foreign providers.

This trend, often called digital sovereignty, is gaining momentum. Countries like Germany and the Netherlands have also explored open source alternatives for government systems. However, France’s latest move is one of the most high-profile examples yet.

Therefore, when France ditches Windows for Linux, it sends a powerful signal to other nations: the era of unquestioned US tech dominance may be waning.

Challenges and Opportunities Ahead

Migrating an entire government infrastructure to Linux is no small feat. Compatibility issues, training costs, and software dependencies pose significant hurdles. However, the long-term benefits—including cost savings, enhanced security, and greater control—are compelling.

For more on how open source solutions are transforming government IT, check out our guide on open source adoption in public sector.

Additionally, the French government plans to invest in local tech ecosystems, fostering homegrown innovation. This aligns with the broader goal of reducing reliance on US tech giants like Microsoft, Amazon, and Google.

What This Means for the Future of Tech

France ditches Windows for Linux at a time when global tech alliances are shifting. As nations prioritize data sovereignty and cybersecurity, open source platforms are becoming increasingly attractive.

This move could inspire other countries to follow suit, accelerating the adoption of open source in government. It also puts pressure on US tech companies to adapt—or risk losing lucrative government contracts.

Interested in how this impacts the cloud computing landscape? Read our analysis on cloud sovereignty in Europe.

In conclusion, France’s decision is more than a technical switch—it’s a statement of intent. By prioritizing digital autonomy, the country is charting a new path for itself and potentially for the entire continent.

For a deeper dive into the geopolitical implications, explore our piece on tech geopolitics and European strategy.

Continue Reading

CyberSecurity

New Hack-for-Hire Campaign Hits Android Devices and iCloud Backups Across the Middle East

Published

on

New Hack-for-Hire Campaign Hits Android Devices and iCloud Backups Across the Middle East

Security researchers have uncovered a sophisticated hack-for-hire group that has been targeting journalists, activists, and government officials across the Middle East and North Africa. This campaign, active between 2023 and 2025, uses phishing attacks to access iCloud backups and deploy Android spyware, raising fresh concerns about the growing private espionage industry.

According to reports from Access Now, SMEX, and Lookout, the hackers employed a range of tactics to infiltrate devices. For iPhone users, they tricked victims into surrendering Apple ID credentials, gaining access to iCloud backups that contained the full contents of their phones. For Android users, they distributed spyware called ProSpy, disguised as popular apps like Signal, WhatsApp, and Zoom, as well as regional messaging apps ToTok and Botim.

This hack-for-hire group appears to be an offshoot of the infamous Indian startup Appin, which was exposed by Reuters in 2022 and 2023 for allegedly hacking corporate executives and government officials. Justin Albrecht, principal researcher at Lookout, noted that while Appin has since shut down, its operations have simply migrated to smaller companies like RebSec, which has since deleted its online presence.

How the Hack-for-Hire Group Operates

The campaign targeted at least three journalists—two in Egypt and one in Lebanon—but Lookout’s investigation suggests the scope is much wider. Victims include government officials in Bahrain, Egypt, the United Arab Emirates, Saudi Arabia, and even individuals in the United Kingdom and possibly the United States. The researchers linked the group to BITTER APT, a hacking collective suspected of ties to the Indian government.

One of the most alarming aspects of this hack-for-hire group is its use of “plausible deniability.” By outsourcing operations to private vendors, governments can avoid direct responsibility. “These operations have become cheaper and it’s possible to evade responsibility, especially since we won’t know who the end customer is,” said Mohammed Al-Maskati, an investigator at Access Now.

Android Spyware and Phishing Attacks: The Technical Details

For Android users, the hackers deployed ProSpy, a spyware that masquerades as legitimate apps. Victims were lured into downloading fake versions of Signal, WhatsApp, or other messaging tools, which then granted attackers full control over the device. This Android spyware could capture messages, photos, and even microphone and camera access.

For iPhone users, the approach was different but equally dangerous. Hackers used phishing emails and messages to trick targets into revealing their Apple ID credentials. Once obtained, they accessed iCloud backups, effectively bypassing iOS security without needing expensive zero-day exploits. As Access Now noted, this is “potentially a cheaper alternative to the use of more sophisticated and expensive iOS spyware.”

Signal Account Hijacking

In some cases, the hackers attempted to register a new device—controlled by them—to the victim’s Signal account. This technique, popular among various hacking groups including Russian spies, allows attackers to intercept encrypted messages without breaking Signal’s encryption itself.

The Growing Threat of Commercial Spyware

This campaign highlights a troubling trend: the rise of commercial spyware and hack-for-hire services that are more accessible than ever. Unlike state-sponsored operations, these private groups offer lower costs and greater anonymity. “For their customers, these hack-for-hire groups are likely cheaper than purchasing commercial spyware,” Albrecht explained.

Building on this, the researchers emphasize that even less sophisticated tools can be highly effective. The hackers behind this campaign may not have the most advanced exploits, but their social engineering and phishing tactics proved sufficient to compromise high-value targets.

What This Means for Digital Security

For journalists and activists in the Middle East, this campaign serves as a stark reminder of the risks they face. As a result, experts recommend enabling two-factor authentication on all accounts, avoiding suspicious links, and regularly reviewing connected devices. For organizations, investing in security awareness training and monitoring for unusual account activity is crucial.

This discovery also underscores the need for stronger regulation of the spyware industry. While some governments have begun to address the issue, the shadowy nature of these companies makes enforcement difficult. The Indian embassy in Washington, D.C. did not respond to requests for comment.

For more insights on protecting your devices, check out our guide on securing your phone from spyware and learn about common phishing tactics.

Continue Reading

CyberSecurity

Operation Masquerade: How US Authorities Neutralized a Massive Russian DNS Hijacking Campaign

Published

on

Operation Masquerade: How US Authorities Neutralized a Massive Russian DNS Hijacking Campaign

In a decisive counter-cyber operation, United States law enforcement has successfully dismantled a significant portion of a sophisticated DNS hijacking network controlled by Russian military intelligence hackers. This campaign, attributed to the notorious group APT28, had compromised thousands of internet routers across more than 23 states, turning them into tools for credential theft and espionage.

The Anatomy of a Router Hijack

For months, the threat actors, linked to Russia’s GRU Military Unit 26165, exploited vulnerabilities in common small office and home office (SOHO) routers. Building on this, they specifically targeted devices from manufacturers like TP-Link. Their method was insidious: by gaining control, they could redirect a user’s internet traffic through malicious servers. This process, known as DNS hijacking, allowed them to intercept login credentials and sensitive data from targeted organizations without the victims’ knowledge.

A Coordinated Transatlantic Response

Therefore, the discovery of this campaign triggered a coordinated response. On April 7, the US Department of Justice and the FBI announced their operation, dubbed “Operation Masquerade,” simultaneously with detailed advisories from the UK’s National Cyber Security Centre and Microsoft Threat Intelligence. This rare public alignment underscored the scale and seriousness of the threat posed by the DNS hijacking network.

Operation Masquerade: A Surgical Takedown

Authorized by a federal court, the FBI’s operation was both technical and precise. Consequently, agents developed and deployed a series of commands to the compromised routers located within the United States. These commands served a triple purpose: to gather forensic evidence on APT28’s activities, to reset the malicious DNS settings, and to close the original vulnerability that allowed the hackers access.

In addition, the operation was tested extensively to ensure it did not damage the routers or collect data from legitimate users. As a result, the fix was designed to be non-destructive. “The court-authorized steps to remediate compromised routers can be reversed by legitimate users at any time through factory resets,” the Justice Department clarified. This approach balanced national security needs with protecting citizens’ property.

Why SOHO Routers Are a Prime Target

This incident highlights a critical vulnerability in global cyber defenses: the often-overlooked SOHO router. These devices are attractive targets for several reasons. First, they are numerous and frequently lack robust security updates from manufacturers. Second, many users and small businesses set them up and forget them, rarely applying firmware patches. Third, compromising a router provides a powerful vantage point to monitor all traffic flowing through a network, making it an ideal tool for espionage.

Brett Leatherman, Assistant Director of the FBI’s Cyber Division, framed the threat starkly: “GRU actors compromised routers in the US and around the world, hijacking them to conduct espionage. Given the scale of this threat, sounding the alarm wasn’t enough.” This statement explains why an active, technical counter-operation was deemed necessary.

Essential Steps to Secure Your Router

In the wake of this takedown, cybersecurity agencies are urging all router owners to take proactive steps. The goal is to prevent your device from becoming part of the next DNS hijacking network. Here is a critical checklist for remediation and protection:

1. Replace Outdated Hardware: Check if your router model is on the manufacturer’s end-of-support list. Older devices no longer receive security updates, leaving them perpetually vulnerable.

2. Update Firmware Immediately: Always download and install the latest firmware directly from the official manufacturer’s website. Do not ignore update notifications.

3. Verify and Secure DNS Settings: Log into your router’s admin panel and ensure the DNS server settings point to legitimate providers like your ISP or a trusted service like Cloudflare or Google DNS. This is a key defense against hijacking.

4. Disable Remote Management: Unless you have a specific, essential need, turn off features that allow you to manage your router from outside your home network. This closes a common attack vector.

5. Follow Official Hardening Guides: Consult the security documentation from your router’s brand (e.g., TP-Link) for specific instructions on changing default passwords and enabling firewalls.

If you suspect your router was compromised, the DOJ advises contacting your local FBI field office or filing a report with the Internet Crime Complaint Center (IC3). For more general guidance on securing your home network, you can read our internal guide on home cybersecurity basics.

A Persistent Threat and a Firm Response

This operation sends a clear message about the evolving nature of state-sponsored cyber threats. Adversaries are increasingly targeting the soft underbelly of network infrastructure—consumer-grade devices—to launch sophisticated attacks. John A. Eisenberg, Assistant Attorney General for National Security, labeled the Russian campaign “a serious and persistent threat,” vowing to “use every tool at our disposal to detect such intrusions and expel hostile foreign actors from our nation’s networks.”

Ultimately, the dismantling of this DNS hijacking network is a significant victory for defensive cyber operations. However, it also serves as a powerful reminder. Cybersecurity is a shared responsibility. While government agencies can disrupt large-scale campaigns, individual users and businesses must secure their own digital gateways. As the FBI emphasized, defending our collective networks truly requires all of us. For a deeper look at how nation-state actors operate, explore our analysis on advanced persistent threat tactics.

Continue Reading

Trending